Anonymity

A VPN allows you to connect to a remote network, and over all ports,
encrypt and forward your traffic. This also changes your IP address.
Chaining VPNs is a tricky task, though there is a simple and uncommon
method I know of. Using multiple VPNs together has the huge perk of
being completely anonymous.

How To Chain VPNs

First, a person would connect to the VPN. Then, when connected to the
first VPN, you chain to the second, and since a bunch of people share
the same IP, the second VPN has no way of knowing who tunnelled to it.
An even better scenario is where you use an eastern VPN as your first,
because our country has no jurisdiction to retrieve the logs from them,
thus increasing your security.However, to chain VPNs, the second VPN would need to know how the
first VPN’s traffic was encrypted. This flaw makes it impossible to
chain them in this method, unless you own both VPNs (not very likely).So, how can we chain VPNs then? I’ll show you how by using a virtual machine!

Requirements

Windows, Mac or Linux OS

Admin/root privileges

OpenVPN

VirtualBox

2 VPNs (there are tons of free ones that you can find with google search)

Step 1 Install OpenVPN & a VirtualBox Computer

Text in bold is a terminal command.First, we need to install the VPN client for Linux users. Windows users can download the program here and here, and run the installer normally. Mac users can use this GUI for OpenVPN for Mac.

Change to the Downloads directory.

Configure the installation.

./configure

Compile and install.

make && sudo make install

Now we need to install VirtualBox. This will allow us to have a
virtual operating systems running from within our computer. Download
VirtualBox: Windows, Mac, Linux.

Install a virtual machine of your choice for Windows or Linux and Mac, then install OpenVPN to it.

Step 2 Chain the VPNs

Start up your virtual machine, and configure them both.

For Windows users using the default VPN .

Connect to VPN A with your host OS.

Start up your virtual machine of choice, and connect to VPN B with it.

Operate from within your virtual machine, and you will be safe from
prying eyes. If you need to delete the virtual machine, make sure you securely delete it, and your information will be safe.

Post a Comment

I'm certainly not an expert, but I'll try my hardest to explain what I do know and research what I don't know. Be sure to check back again , after moderation i do make every effort to reply to your comments .